The mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (application crash) via a packet containing an invalid pointer value that triggers an incorrect memory-allocation attempt.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | 1.4.0 (including) | 1.4.0 (including) |
Wireshark | Wireshark | 1.4.1 (including) | 1.4.1 (including) |
Wireshark | Wireshark | 1.4.2 (including) | 1.4.2 (including) |
Wireshark | Wireshark | 1.4.3 (including) | 1.4.3 (including) |
Wireshark | Wireshark | 1.4.4 (including) | 1.4.4 (including) |
Wireshark | Wireshark | 1.4.5 (including) | 1.4.5 (including) |
Wireshark | Wireshark | 1.4.6 (including) | 1.4.6 (including) |
Wireshark | Wireshark | 1.4.7 (including) | 1.4.7 (including) |
Wireshark | Wireshark | 1.4.8 (including) | 1.4.8 (including) |
Wireshark | Wireshark | 1.4.9 (including) | 1.4.9 (including) |
Wireshark | Wireshark | 1.4.10 (including) | 1.4.10 (including) |
Wireshark | Wireshark | 1.4.11 (including) | 1.4.11 (including) |
Wireshark | Ubuntu | natty | * |
Wireshark | Ubuntu | oneiric | * |
Wireshark | Ubuntu | upstream | * |